Southern Africa has launched into one of many global? s so much formidable defense co-operation tasks, looking to roll out the rules of the United countries at neighborhood degrees. This e-book examines the triangular courting among democratisation, the nature of democracy and its deficits, and nationwide defense practices and perceptions of 11 southern African states.

This publication constitutes the refereed complaints of the fifth Australasian convention on details safeguard and privateness, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised complete papers offered including invited contributions have been conscientiously reviewed and chosen from a complete of eighty one submissions.

Even where access to equipment in the computer centre is well controlled it is quite usual to find that on-line terminals in outlying offices, building sites or factories can be accessed in a completely uncontrolled fashion. The major access security features include: • control of access to all entrances and exit points from the building; • staff identification methods, such as passes, badges, photocards, radio tokens and methods of biometric identification; • more stringent access control methods for the computer suite, terminal rooms and other sensitive areas (air conditioning, power supplies and communications); • use of security staff and surveillance equipment (such as CCTV and movement detectors).

The effects of each on a business may range from the irrelevant to the catastrophic, and an informed opinion must be reached before considering the need for security measures. The most obvious effect is financial-loss of money or the need to spend more money to replace lost resources, assets or facilities. There are many 24 Risk and Vulnerability others which may have indirect financial implications but require other aspects to be considered. Examples are: • loss of existing or future business; • loss of reputation, goodwill or public confidence; • penalties imposed on organisations or individuals in the event of contravention of laws or other regulations.

The effects of each on a business may range from the irrelevant to the catastrophic, and an informed opinion must be reached before considering the need for security measures. The most obvious effect is financial-loss of money or the need to spend more money to replace lost resources, assets or facilities. There are many 24 Risk and Vulnerability others which may have indirect financial implications but require other aspects to be considered. Examples are: • loss of existing or future business; • loss of reputation, goodwill or public confidence; • penalties imposed on organisations or individuals in the event of contravention of laws or other regulations.